First Page | Document Content | |
---|---|---|
Date: 2012-12-05 15:13:00CWC mode OCB mode Block cipher Feistel cipher Advantage Cipher Cryptographic hash function Advanced Encryption Standard EAX mode Cryptography Block cipher modes of operation Authenticated encryption | Add to Reading ListSource URL: csrc.nist.govDownload Document from Source WebsiteFile Size: 907,10 KBShare Document on Facebook |
A preliminary version of this papers appears in Fast Software Encryption ’04, Lecture Notes in Computer Science, vol. ?? , R. Bimal and W. Meier ed., Springer-Verlag, 2004. This is the full version. The EAX Mode of OpeDocID: 1s3Vm - View Document | |
YubiHSM User Manual Version: 1.5.0 April 6, 2015 yubicoDocID: 17Z30 - View Document | |
AUTHENTICATED ENCRYPTION Mihir Bellare UCSDDocID: 13aK2 - View Document | |
Comments to NIST concerning AES Modes of Operations: CTR-Mode EncryptionDocID: Rn7V - View Document | |
yubico cococo YubiHSM 1.0 security advisory[removed]Abstract A security review has revealed two methods to decrypt AES-CCM encrypted data (so called AEADs) if an attacker has live (remote) access to an unlocked YubiHSM,DocID: MjcH - View Document |